In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Cloud Security Posture Management and RedSeal
/by Nate L. Cash, Senior Director, Federal Professional Services/ Director of Information SecurityGaps in your security posture are where the cyber storm fronts are and the cyber storm is both on-prem and in the cloud. To do your job correctly, you need to get an accurate forecast today of the cyber weather, and the rush to move assets into the cloud has created all sorts of new stormy weather to contend with.
Old Fortinet Flaws are being used to breach federal and commercial networks
/by Heidi Gerken, Senior Sales EngineerThe Federal Bureau of investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have released a joint advisory warning that 3 Fortinet CVEs (CVE 2018-13379, CVE-2020-12812, and CVE-2019-5591) are being leveraged to gain a foothold in government agency and commercial networks to be exploited in the future.
F5 Server iControl REST unauthenticated remote command execution vulnerability
/by Heidi Gerken, Senior Sales EngineerF5 has released patches for several BIG-IP and BIG-IQ critical vulnerabilities. CVE-2021-22986 is the most critical since it allows unauthenticated attackers with network access to use the iControl REST interface, via the BIG-IP management interface and self IP addresses, to execute system commands that could lead to complete system compromise.
Microsoft Releases Fixes for 4 Zero Day Exchange Server Vulnerabilities
/by Bill Burge, RedSeal Professional ServicesMultiple news sources, security researchers and security agencies have reported on a new attack against tens, if not hundreds, of thousands of Internet accessible Exchange servers configured for Secure Sockets Layer (SSL)/Transport Layer Security (TLS) Outlook Web App (OWA) access. These attacks are being carried out by the China nation/state sponsored hacking group known as Hafnium.
NSA publishes list of top vulnerabilities currently targeted by Chinese hackers
/by Bill Burge, RedSeal Professional ServicesThe U.S. National Security Agency published a report detailing the top 25 vulnerabilities consistently being scanned, targeted, and exploited by Chinese state-sponsored hacking groups. All 25 vulnerabilities are known and have patches available from their vendors.
Lessons for All of Us From the SolarWinds Orion Compromise
/by Dr. Mike Lloyd, CTO, RedSealAll cybersecurity news events, like the recent disclosure of compromise involving SolarWinds Orion by APT 29, aka “Cozy Bear,” cause CISOs to ask the same initial questions:
Do I have this problem? Where? What are the consequences?
In this instance, the attack is extremely sophisticated, and quite alarming – it’s a supply chain attack, involving […]
Supporting the DoD’s Defend Forward Initiative
/by Wayne Lloyd, Federal CTO, RedSealWhat is Defend Forward?
The DoD’s Defend Forward operational concept has been rolling out over the past few years. Policy makers and cyber defenders in government realized that, as the situation in Afghanistan led directly to the rise of Al-Qaeda and the 9-11 attacks, the situation in cyberspace was going to lead to crippling […]
Why I Chose RedSeal
/by Bryan Barney, RedSeal CEOI’ve been in cybersecurity for 19 years and love the field. It’s technically a very challenging problem to solve and the stakes are extremely high. Those of us in this field are defending the foundation of the information age. We are protecting the money in people’s bank accounts, their personal privacy and dignity, and even […]
High Severity Security Flaw with Cisco ASA: Find It and Prioritize Patching Quickly
/by Debra Baker, CISSP CCSPRedSeal Cyber Threat Series
Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) have a known vulnerability – CVE-2020-3452. This security vulnerability can allow an unauthenticated attacker to remotely conduct a directory traversal attack as well as read sensitive files on a targeted system.
Exploiting this vulnerability, the attacker can view files […]
Be Prepared with RedSeal: DOD-Required Cybersecurity Maturity Model Certification
/by Jay BranaganCybersecurity Maturity Model Certification (CMMC) is a tiered system in which defense contractors—or any organization holding Controlled Unclassified Information (CUI) must be vetted by a third-party assessor on a five-level scale to determine the maturity of their enterprise security. This requires companies that do business with the Department of Defense to protect their data since […]